Tag: CYBERSECURITY

June 4, 2024 | by Gilad Maayan
Yoast Focus Keyword

Incident Response for Critical APIs

What Is Incident Response? Incident response is a structured approach to addressing and managing the aftermath of a security breach or cyberattack, also referred to as an IT incident, computer incident, or security incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. Additionally, it … Continued

read more
July 28, 2023 | by Gilad Maayan
DevSecOps

The DevSecOps Toolchain: Vulnerability Scanning, Security as Code, DAST & More

What Is DevSecOps?  DevSecOps is a philosophy that integrates security practices within the DevOps process. DevSecOps involves creating a ‘security as code’ culture with ongoing, flexible collaboration between release engineers and security teams. The main aim of DevSecOps is to make everyone accountable for security in the process of delivering high-quality, secure applications. This culture … Continued

read more
September 30, 2022 | by James Truslow
Cyber Posture in Health Care

Putting HC3’s Cyber Posture Recommendations into Practice

The Rising Threat of Cybercrime in Healthcare Of growing concern to both patients and the professionals who facilitate their care is the growing trend of healthcare organizations being preyed upon by cybercriminals. In the United States, recent political dialogue has brought special attention to patients’ privacy rights under HIPAA and the ongoing security of their … Continued

read more
July 13, 2022 | by James Truslow
Marriott Data Breach

What IT Pros Can Learn from the Marriott Data Breach

Despite the best efforts of individuals to protect their own data, they cannot always account for the cybersecurity shortcomings of larger organizations such as their employers, financial institutions, and healthcare providers entrusted with their personal information. Recently, it was made painfully apparent that hotels should also be added to this list of vulnerable entities based … Continued

read more
May 3, 2022 | by Ritika Bramhe
SIEM tools

SIEM: Introduction to SIEM and 4 Top SIEM Tools

Security Information and Event Management (SIEM) technology has become a fundamental part of identifying and guarding against cyber attacks. It is one of the essential technologies powering the modern security operations center (SOC). SIEM is an umbrella term that includes multiple technologies, including log management, security log aggregation, event management, event correlation, behavioral analytics, and … Continued

read more
March 9, 2022 | by Christopher Gonzalez
Azure Sentinel

What Is Microsoft Azure Sentinel and Why Is It Important?

Microsoft Azure Sentinel is an intelligent, next-generation security information and event management (SIEM) solution designed to detect threat anomalies. Azure Sentinel is also categorized as a security orchestration automated response (SOAR) service that expedites the incident detection and event response process for cybersecurity teams. Azure Sentinel provides an extra layer of security to protect critical … Continued

read more
February 24, 2022 | by OnPage Corporation
endpoint detection

Can Endpoint Protection Keep up With Modern Threats?

Endpoint protection is a security approach that focuses on monitoring and securing endpoints, such as desktops, mobile devices, laptops, and tablets. It involves deploying security solutions on endpoints to monitor and protect these devices against cyber threats. The goal is to establish protection regardless of the endpoint’s location, inside or outside the network. In this … Continued

read more
September 8, 2021 | by OnPage Corporation
New Malware

10 Most Dangerous New Malware and Security Threats in 2021

Cyberthreats including malware, viruses, and other security hazards are constantly evolving and becoming more dangerous and harder to detect. This makes it quite difficult to keep your data and information protected nowadays. Unless you are sure that you are absolutely protected, which is wishful thinking, you remain at risk of attacks by the latest strains … Continued

read more

OnPage